Resources

Blogs, Latest Research, Announcements, and more

Suiet Wallet Extension Audit Report

Download the Report Here: https://www.numencyber.com/wp-content/uploads/2023/06/Suiet-Audit.pdf

Numen Cyber Partners with MUFEX to Revolutionize Web3 Security and Decentralized Trading

Numen Cyber is pleased to announce its strategic partnership with MUFEX, a decentralized derivatives exchange (DEX).

Analysis of CVE-2023-29336 Win32k Privilege Escalation Vulnerability (with POC)

Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.

How to Choose the Right Cryptocurrency Wallet

Learn the principles of selecting the right cryptocurrency wallet for secure asset management and transactions.

A Detailed Analysis on EDE Finance’s $520K Hack

On 30 May 2023, EDE Finance was hacked for approximately $580k (437k $USDC & 86k $USDT). Here's a detailed analysis of the event.
Audit report

Suiet Wallet Extension Audit Report

Download the Report Here: https://www.numencyber.com/wp-content/uploads/2023/06/Suiet-Audit.pdf

Blog

Numen Cyber Partners with MUFEX to Revolutionize Web3 Security and Decentralized Trading

Numen Cyber is pleased to announce its strategic partnership with MUFEX, a decentralized derivatives exchange (DEX).

Blog

Analysis of CVE-2023-29336 Win32k Privilege Escalation Vulnerability (with POC)

Analyzing CVE-2023-29336 Win32k vulnerability, its exploitation, and mitigation measures in the context of evolving security practices.

Blog

How to Choose the Right Cryptocurrency Wallet

Learn the principles of selecting the right cryptocurrency wallet for secure asset management and transactions.

Blog

A Detailed Analysis on EDE Finance’s $520K Hack

On 30 May 2023, EDE Finance was hacked for approximately $580k (437k $USDC & 86k $USDT). Here’s a detailed analysis of the event.

Blog

A Detailed Analysis of Arbitrum-based Jimbos Protocol’s $7.5 Million Hack

Delve into the intricacies of the $7.5 million hack on Jimbos Protocol, unravelling the details and implications of the breach.